03-07-2015, 09:25 PM
(This post was last modified: 05-23-2018, 12:02 PM by BlackCadejo.)
Hey, I've been planning to release this for a while now. Not many people know about this so I'm going to share it with the members of HackSociety.
Note: This can be patched, it won't always work if the client is obfuscated.
#1 -
#2 - Get a hold of the servers .jar file.
#3 - Drag the .jar to your desktop, right click it, and open it with Win-rar.
#4 - If you get a new tab that shows META-INF, sign, and a bunch of .class files then the client is vulnerable.
#5 -
#7 - Now open up NetBeans and Open the Reflection folder.
#8 - Once you located the file and have it on your Projects, right click it and run it.
#9 - A Cheat panel will pop up and the client, now you may "hack" the RSPS.
Commands
Need more help? Post below. I'll help you with anything relating to this besides adding new commands, functions, etc.
Note: This can be patched, it won't always work if the client is obfuscated.
#1 -
Hidden Content Wrote:You must reply in order to see the hidden content!#1A - Install NetBeans
#2 - Get a hold of the servers .jar file.
Hidden Content Wrote:You must reply in order to see the hidden content!If you managed to get the .jar, you may proceed.
#3 - Drag the .jar to your desktop, right click it, and open it with Win-rar.
#4 - If you get a new tab that shows META-INF, sign, and a bunch of .class files then the client is vulnerable.
#5 -
Hidden Content Wrote:You must reply in order to see the hidden content!#6 - Open the classes directory and drag all the files from the .jar (win-rar) tab into the reflection folder in the classes directory.
#7 - Now open up NetBeans and Open the Reflection folder.
#8 - Once you located the file and have it on your Projects, right click it and run it.
#9 - A Cheat panel will pop up and the client, now you may "hack" the RSPS.
Commands
Hidden Content Wrote:You must reply in order to see the hidden content!
Need more help? Post below. I'll help you with anything relating to this besides adding new commands, functions, etc.